Bug 1501819 (CVE-2017-1000401) - CVE-2017-1000401 jenkins: Form validation for password fields was sent via GET (SECURITY-616)
Summary: CVE-2017-1000401 jenkins: Form validation for password fields was sent via GE...
Keywords:
Status: NEW
Alias: CVE-2017-1000401
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1558869 1501972 1558870
Blocks: 1501826
TreeView+ depends on / blocked
 
Reported: 2017-10-13 09:22 UTC by Adam Mariš
Modified: 2019-09-29 14:24 UTC (History)
13 users (show)

Fixed In Version: jenkins 2.73.2, jenkins 2.83
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Adam Mariš 2017-10-13 09:22:20 UTC
The Jenkins default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkins, and made available to users with access to these log files.

External References:

https://jenkins.io/security/advisory/2017-10-11/

Comment 1 Kurt Seifried 2017-10-13 15:34:26 UTC
Created jenkins tracking bugs for this issue:

Affects: openshift-1 [bug 1501972]

Comment 2 Jason Shepherd 2018-03-21 07:53:35 UTC
Created jenkins tracking bugs for this issue:

Affects: fedora-all [bug 1558869]


Note You need to log in before you can comment on or make changes to this bug.